Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
BITS Pilani Crypto Make-Up #1 Regular Session #2.
Classical Cryptography
1 Day 04- Cryptography Acknowledgements to Dr. Ola Flygt of Växjö University, Sweden for providing the original slides.
CYPHER INDEX n Introduction n Background n Demo INTRODUCTION n Cypher is a software toolkit designed to aid in the decryption of standard (historical)
Chapter 2 – Classical Encryption Techniques
Block and Stream Ciphers1 Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Polyalphabetic Substitution Ciphers. First Steps Towards Complexity  If one alphabet is good, then two alphabets must be better!  By doubling the number.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Information Systems Security
1 Chapter 2 Plain Text Also called as clear text Language that we normally use Easily understood by everybody.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Symmetric-Key Cryptography
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Classic Cryptography History. Some Basic Terminology plaintext - original message ciphertext - coded message cipher - algorithm for transforming plaintext.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Section 2.5: Polyalphabetic Substitutions Practice HW (not to hand in) From the Barr Text p. 118 # 1-6.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Section 2.5 Polyaphabetic Substitutions
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Instructor: Dania Alomar
Network Security Lecture 13 Presented by: Dr. Munam Ali Shah.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
1 Classical Encryption Techniques. 2 Symmetric cipher model –Cryptography –Cryptanalysis Substitution techniques –Caesar cipher –Monoalphabetic cipher.
Introduction to Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
3.1 Chapter 3 Traditional Symmetric-Key Ciphers Part2.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
@Yuan Xue Quick Review.
CRYPTOGRAPHY G REEK WORD MEANING “ SECRET WRITING ”
Classical Cryptography
Substitution Ciphers.
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Network Security Unit-1
SUBSTITUTION CIPHERS A substitution technique is one in which the letters/number/symbols of plain text are replaced by other letters/numbers/symbols.
Prepared by: Sameer Ali Aljaroodi, Tutor: Mr. Ahmad Kananh
Group 04: Yiyang Zhongyang Tan Xiao
Classical Polygraphic Ciphers
Cryptography and Network Security
Lecture Classical Encryption Techniques Dr. Nermin Hamza
Computer and Data Security 4th Class
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Computer and Data Security 4th Class
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Outline Some Basic Terminology Symmetric Encryption
- Stream Cipher and Block Cipher - Confusion & Diffusion
Chapter 3:Cryptography (16M)
Transposition Ciphers
PART VII Security.
Encryption and Decryption
برگرفته از اسلایدهای © University of Glamorgan
SYMMETRIC ENCRYPTION.
Information Security IT423
Double Transpositions
. Columnar Transposition
Permutation Ciphers Instead of substituting different characters, scramble up the existing characters Use algorithm based on the key to control how they’re.
Presentation transcript:

Running Key Cipher The security of polyalphabetic substitution cipher reside in key length. In running-key cipher, the length of key must be equal the length of plaintext and the encryption process performed by using Vigenere table If the length of key is greater than the length of plaintext, then all the remaining letters in key must be deleted

Running Key Cipher Ex P= computer Key= omarabda

Running Key Cipher Applying this format for ciphering C= (P+K) mod 26 So the Ciphertext will be = qamguuhr Now for deciphering apply this format P= (C-K) mod 26 to get the plaintext = computer.

One Time Pad (OTP) Simple substitution and transposition ciphers individually do not provide a very high level of security. However, by combining these transformations it is possible to obtain strong cipher The message is represented as a binary string ( a sequence of 0's and 1's) using coding machine such as ASCII coding. The encryption is done by applying Exclusive OR (XOR) operation between message and key with the symbol ⊕ is used.

One Time Pad (OTP)

One Time Pad (OTP)

One Time Pad (OTP)

One Time Pad (OTP) EXAMPLE Encryption M = A=65=1000001 K = B=66=1000010 E (1)k (m) = m  k = 0000011 m1 = 0 m2 = 0 m3 = 01 m4 = 0 m5 = 0 m6 =1 m7 = 1 E (2) k (m) = (m4m5m6m1m2m3m7) = ( 0010001) Decryption D2(m) = m1m2m3m4m5m6m7 = 00000011 1 C= 000001 K= 1000010   D (1)k (c) = c  k =1000001=65=A

Playfair Cipher 1-If both letters are the same (or only one letter is left), add an "X" after the first letter. Encrypt the new pair and continue. Some variants of Playfair use "Q" instead of "X", but any uncommon monograph will do. 2-If the letters appear on the same row of your table, replace them with the letters to their immediate right respectively (wrapping around to the left side of the row if a letter in the original pair was on the right side of the row).

Playfair Cipher If the letters appear on the same column of your table, replace them with the letters immediately below respectively (wrapping around to the top side of the column if a letter in the original pair was on the bottom side of the column). If the letters are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. The order is important – the first letter of the encrypted pair is the one that lies on the same row as the first letter of the plaintext pair.

Playfair Cipher Encrypting the message "Hide the gold in the tree stump": Plain text : HI DE TH EG OL DI NT HE TR EX ES TU MP Cippher text = BM OD ZB XD NA BE KU DM UI XM MO UV IF  

Playfair Cipher

Playfair Cipher

Playfair Cipher

Bifid Cipher The first of the three rules for Playfair encipherment changes one two-letter group, or digraph, to another by exchanging column co-ordinates. This suggests using row and column co-ordinates in a more general fashion. Let's take the 5 by 5 square above, but number the rows and the columns, like this

Bifid Cipher